current location:Home > Technical Articles > Operation and Maintenance > Safety
- Direction:
- All web3.0 Backend Development Web Front-end Database Operation and Maintenance Development Tools PHP Framework Daily Programming WeChat Applet Common Problem Other Tech CMS Tutorial Java System Tutorial Computer Tutorials Hardware Tutorial Mobile Tutorial Software Tutorial Mobile Game Tutorial
- Classify:
-
- How to analyze Google Chrome remote code execution 0Day vulnerability notification
- 1. Overview On April 13, 2021, Antiy CERT discovered that foreign security researchers released a PoC of a remote code execution 0Day vulnerability in the Google Chrome browser. Attackers can use the vulnerability to construct a specially crafted page, and users accessing the page will cause remote code execution. The vulnerability affects the latest official version of Chrome (89.0.4389.114) and all earlier versions. Antiy CERT followed up and found out that due to the high usage rate of Google Chrome browser in China, this vulnerability has the risk of being exploited by malicious code and spread widely, and the threat level is high. At the same time, Antiy's CERT test found that some other domestic browsers using the Google Chrome kernel are also affected. Currently as
- Safety 1006 2023-05-16 12:37:06
-
- How to analyze DataSet objects and use them
- The concept of DataSet object: DataSet object can be regarded as a (Catch), which can retain the data found in the database, and can even temporarily store the entire database. DataSet is the representation of data in memory. DataSet object and data The connection to the source occurs very briefly. We disconnect from the data source immediately after obtaining the data. The connection will not be established until the data is modified or the data in the data source needs to be manipulated. The DataSet object contains a set of DataTable objects and DataRelation objects. DataTable object and use The DataTable object is one of the important objects of DataSet and represents a relational number in memory.
- Safety 1278 2023-05-16 11:55:06
-
- What are the dangers of secondary release of C language source code?
- 1. Secondary release. A simple understanding of secondary release is that the memory pointed to by the same pointer is released twice. For C language source code, performing two free() operations on the same pointer may lead to a secondary release. Chapter 3.1 of this article The defect code is a description of such a situation. In the C++ language, improper shallow copy operation is one of the common causes of secondary release. For example: calling the assignment operator or copy constructor once will cause the data members of the two objects to point to the same dynamic memory. At this time, the reference counting mechanism becomes very important. When the reference counting is improper and an object goes out of scope, the destructor will release the memory shared by the two objects. The corresponding data member in another object will point to the memory address that has been released, and when this object
- Safety 2251 2023-05-16 11:37:11
-
- Process analysis from entering the URL to the final browser rendering of the page content
- Prepare: When you enter a URL (such as www.coder.com) in the browser and hit Enter, the first thing the browser needs to do is to obtain the IP address of coder.com. The specific method is to send a UDP packet to DNS server, the DNS server will return the IP of coder.com. At this time, the browser will usually cache the IP address, so that the next visit will be faster. For example, in Chrome, you can view it through chrome://net-internals/#dns. With the server's IP, the browser can initiate an HTTP request, but the HTTPRequest/Response must be in the "virtual" TCP
- Safety 1646 2023-05-16 11:28:12
-
- What are the weblogic attack techniques?
- Introduction: Weblogic servers are characterized by large and complex architectures, which are generally difficult for blue teams to defend and are mostly deployed on the external network. Moreover, weblogic's attack cost is relatively low. As long as there is a vulnerability, you can generally directly obtain the root permissions of the target server. During offensive and defensive exercises, it was focused on by all major attacking teams and defenders. Of course, there are more or less problems with various exploit programs currently available on the Internet, including my own tools. So recently, at the request of a friend, I sorted out some attack methods and "perfect" uses. The red team can use it to improve their own tools, and the blue team can use it to write traceability reports. 1. Detect whether there are vulnerabilities in weblogic. Among the information currently published on the Internet, there is no better way to determine whether weblogic has vulnerabilities.
- Safety 1988 2023-05-16 11:16:06
-
- How to understand grub password
- The grub password is divided into: whole area password (you need to enter the grub global password to modify the grub label after setting) and menu password (you need to enter the grub menu password to boot the system after setting). If you forget the grub global password, you can enter the rescue mode (rescue, similar to winPE). Reset the grub password. In addition to plain text, the grub password can also use encrypted cipher text. grub encryption tools include: grub-md5-crypt and grub-crypt grub-md5-crypt: MD5 encrypt the password and output grub-crypt: If possible, select the encryption method --md5, --sha-256, --sha-512 ( Default) Edit text
- Safety 1644 2023-05-16 10:13:05
-
- What details need to be paid attention to in web testing?
- 1. Page display part (1) First, pay attention to whether the page can be displayed completely, including whether different browsers can display it completely. In actual tests, it is often found that some pages or pop-up windows on the page cannot be fully displayed (2) Whether the animation effect or font effect can be displayed correctly (3) Whether there are default prompts for some form items, input boxes, input fields, and drop-down boxes on the page, and whether some prompts and some do not prompt (4) There are multiple items in the data list Whether the data is displayed in pages, and whether the page jumps normally after the paging operation. 2. Page resolution: Does the page layout display normally in the resolution mode of 640x400, 600x800 or 1024x768? Is the font too small to be browsed? Or is it too large? ?
- Safety 1535 2023-05-16 09:55:05
-
- What is the difference between raid0 and raid1 in windows
- The difference between raid0 and raid1 1. Concept 1. RAID0: RAUD0 is the simultaneous writing and reading of multi-disk data groups. 2. RAID1: RAID1 means simultaneous writing and reading of data on multiple disks. 2. Security 1. RAID0: No data backup function and poor security. 2. RAID1: The disks back up each other and have high security. 3. Performance 1. The theoretical read and write speed of RAID0 is X times that of a single disk, where X refers to the number of disks added to the same array. At the same time, the capacity is also X times that of a single disk. 2. The read and write speed of RAID1 is the same as that of a single disk, and the capacity is that of a single disk. Detailed introduction to raid0: RAID0 continuously splits data in units of bits or bytes, reads/writes on multiple disks in parallel, and has high data
- Safety 3317 2023-05-16 09:07:13
-
- What are the HTTP response status codes?
- HTTP is an application layer protocol, although the HTTP/2 version was launched in 2015 and is supported by major web browsers and web servers. Its main features can be summarized as follows: Supports client/server model. Simple and fast: When a client requests a service from the server, it only needs to transmit the request method and path. Due to the simplicity of the HTTP protocol, the program size of the HTTP server is small and the communication speed is very fast. Flexible: HTTP allows the transmission of any type of data object. The type being transferred is marked by Content-Type. No connection: The meaning of no connection is to limit each connection to only process one request. After the server processes the client's request and receives the client's response, it disconnects. In this way, you can save
- Safety 2959 2023-05-16 08:37:05
-
- How to avoid weak encryption in C language
- 1. Weak encryption Encryption refers to using a special algorithm to change the original information data, so that even if unauthorized users obtain the encrypted information, they still cannot understand the content of the information because they do not know the decryption method. Common encryption algorithms can be mainly divided into: symmetric encryption, asymmetric encryption, and one-way encryption. Various encryption algorithms are used in different scenarios. Choose the appropriate algorithm based on the characteristics of the encryption algorithm, such as computing speed, security, and key management methods. However, security is an important indicator to measure the quality of the encryption algorithm. Encryption that is easily cracked Algorithms are called weak encryption algorithms, such as the DES algorithm that can be cracked in a limited time using exhaustive methods. This article takes the JAVA language source code as an example to analyze the causes of weak encryption and how to repair it. 2. The danger of weak encryption
- Safety 1735 2023-05-16 08:19:12
-
- How to Analyze Code Auditing in Java Web Security
- 1. JavaWeb Security Basics 1. What is code auditing? In layman’s terms, Java code auditing is to discover security issues in the Java application itself by auditing Java code. Since Java itself is a compiled language, even if there are only class files We can still audit Java code. For uncompiled Java source code files, we can read the source code directly, but for compiled class or jar files, we need to decompile them. Java code auditing itself is not very difficult. As long as you are proficient in the auditing process and common vulnerability auditing techniques, you can complete the code auditing work relatively easily. But the way of Java code auditing is not just to use
- Safety 2313 2023-05-16 08:04:21
-
- How to expand disk space of xen virtual machine
- With the extensive use of virtualization technology, there are more and more ideas about using virtualization, such as directly expanding the disk space. In this case, I recommend adding a new disk, which is consistent with the normal use of physical machines. There is another way to increase disk space, which is to directly expand the space of the existing disk. This method is used in this article. 1. View the virtual machine configuration file xmlist2.dd2. The virtual machine uses /data/dd2.img3. Directly expand the existing virtual disk space. Now view the virtual machine disk file size ll-h directly expand the virtual machine disk file ddif=/dev/sdb1bs= 1024Mcount=4>>/data/dd2.img has been expanded
- Safety 1942 2023-05-15 22:55:13
-
- How to perform Apache Struts2 S2-057 remote code execution vulnerability analysis
- Preface The Apache Struts framework is an open source project based on the Web application framework of JavaServlets, JavaBeans, and JavaServerPages (JSP). Struts is based on the Model-View-Controller (MVC) design pattern and can be used to build complex Web applications. It allows us to decompose the code of an application's business logic, control logic and presentation logic, making it more reusable and maintainable. The Struts framework is part of the Jakarta project and is managed by the Apache Software Foundation. Tianrongxin Alpha Lab will bring you ApacheStruts2S2-057
- Safety 2104 2023-05-15 21:43:04
-
- How to configure Cisco Catalyst 4948 for CNA management
- Prepare the Catalyst4500 switch for CNA. Switch switch restore to factory default recovery command switch>enableswitch#erasestartup-configswitch#reload. If you want the switch to be managed by CNA, the following two conditions must be met at the same time: Have a network management IP address. Configure IPSwitch for g1/1 port#configureSwitch(config)#interfacegigabitEthernet1/1Switch(config-if)#noswitchportSwitch(config-if)#ipaddres
- Safety 1000 2023-05-15 21:28:04
-
- How nmap hides itself from scanning
- 192.168.1.216 is a zombie, 192.168.1.212 is the scanned end nmap-sn192.168.1.0/24 scans the online host nmap-Pn-sI192.168.1.216192.168.1.212 (-Pn hides itself, -sIidlescan) IDS can only detect When scanning 192.168.1.216 on 192.168.1.212, the scan of the nmap host cannot be detected.
- Safety 1513 2023-05-15 21:22:16